scholarly journals Evidence from FDA Compliance Check Inspections on the Effectiveness of Retail Access Controls on Tobacco Purchases

Qeios ◽  
2021 ◽  
Author(s):  
Tengjiao Chen ◽  
Adam Zion ◽  
Jonah Joselow ◽  
Parker Kasmer
2021 ◽  
Vol 45 (3) ◽  
pp. 576-587
Author(s):  
Tengjiao Chen ◽  
Shivaani Prakash ◽  
Adam Zion ◽  
Jonah Joselow ◽  
Saul Shiffman ◽  
...  

Objectives: Those underage should not use tobacco products, including electronic nicotine delivery systems. A technologically-based solution developed by Juul Labs Inc to restrict underage access seeks to automate transactions, structurally mandate age-verification, and limit the quantity of JUUL products purchased per transaction. A pilot of this standards-based approach, referred to as RACS™ (Retail Access Control Standards), was conducted to assess efficacy. Methods: RACS was implemented at 171 stores within 3 retail chains selling tobacco products in 3 states. "Secret shopper" compliance audits, in which a mystery shopper attempted to purchase JUUL products, were conducted at participating stores before and after implementation of RACS, to test compliance with age-verification and product-quantity limits. Audit failure rates were compared pre- and post-RACS implementation to assess effectiveness. Comparisons were made overall, by chain, state, and failure type. Results: A total of 3990 audits were conducted. We found large, statistically significant reductions (p < .001) in failure rates for age-verification and compliance with product-quantity limits after implementing RACS, as compared to pre-RACS rates, declining to near zero. Conclusions: Utilizing enhanced access controls can be part of a comprehensive, evidence-based tobacco-control strategy to address underage use of all tobacco products, including JUUL.


1976 ◽  
Vol 15 (01) ◽  
pp. 36-42 ◽  
Author(s):  
J. Schlörer

From a statistical data bank containing only anonymous records, the records sometimes may be identified and then retrieved, as personal records, by on line dialogue. The risk mainly applies to statistical data sets representing populations, or samples with a high ratio n/N. On the other hand, access controls are unsatisfactory as a general means of protection for statistical data banks, which should be open to large user communities. A threat monitoring scheme is proposed, which will largely block the techniques for retrieval of complete records. If combined with additional measures (e.g., slight modifications of output), it may be expected to render, from a cost-benefit point of view, intrusion attempts by dialogue valueless, if not absolutely impossible. The bona fide user has to pay by some loss of information, but considerable flexibility in evaluation is retained. The proposal of controlled classification included in the scheme may also be useful for off line dialogue systems.


2021 ◽  
Vol 11 (11) ◽  
pp. 4834
Author(s):  
Kai Ren Teo ◽  
Balamurali B T ◽  
Jianying Zhou ◽  
Jer-Ming Chen

Many mobile electronics devices, including smartphones and tablets, require the user to interact physically with the device via tapping the touchscreen. Conveniently, these compact devices are also equipped with high-precision transducers such as accelerometers and microphones, integrated mechanically and designed on-board to support a range of user functionalities. However, unintended access to these transducer signals (bypassing normal on-board data access controls) may allow sensitive user interaction information to be detected and thereby exploited. In this study, we show that acoustic features extracted from the on-board microphone signals, supported with accelerometer and gyroscope signals, may be used together with machine learning techniques to successfully determine the user’s touch input location on a touchscreen: our ensemble model, namely the random forest model, predicts touch input location with up to 86% accuracy in a realistic scenario. Accordingly, we present the approach and techniques used, the performance of the model developed, and also discuss limitations and possible mitigation methods to thwart possible exploitation of such unintended signal channels.


1996 ◽  
Vol 39 (10) ◽  
pp. 87-93 ◽  
Author(s):  
Paul Resnick ◽  
James Miller

Author(s):  
N. CH. Ravi ◽  
M. Naresh Babu ◽  
R. Sridevi ◽  
V. Kamakshi Prasad ◽  
A. Govardhan ◽  
...  

Author(s):  
Asmaa Tellabi ◽  
Jochen Sassmanhausen ◽  
Edita Bajramovic ◽  
Karl Christoph Ruland
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document